dc.contributor.author | Zurutuza, Urko | |
dc.contributor.other | González, Silvia | |
dc.contributor.other | Corchado, Emilio | |
dc.contributor.other | Sedano, Javier | |
dc.contributor.other | Herrero, Álvaro | |
dc.date.accessioned | 2022-05-23T14:58:52Z | |
dc.date.available | 2022-05-23T14:58:52Z | |
dc.date.issued | 2016 | |
dc.identifier.issn | 1367-0751 | en |
dc.identifier.issn | 1368-9894 | en |
dc.identifier.other | https://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&ficha_no=116640 | en |
dc.identifier.uri | https://hdl.handle.net/20.500.11984/5583 | |
dc.description.abstract | The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an appealing target for attackers, aiming to guess root passwords performing dictionary attacks or to directly exploit the service itself. To identify such situations, this article addresses the detection of SSH anomalous connections from an intrusion detection perspective. The main idea is to compare several strategies and approaches for a better detection of SSH-based attacks. To test the classification performance of different classifiers and combinations of them, SSH data coming from a real-world honeynet are gathered and analysed. For comparison purposes and to draw conclusions about data collection, both packet-based and flow data are analysed. A wide range of classifiers and ensembles are applied to these data, as well as different validation schemes for better analysis of the obtained results. The high-rate classification results lead to positive conclusions about the identification of malicious SSH connections. | en |
dc.language.iso | eng | en |
dc.publisher | Oxford Academic | en |
dc.rights | © Oxford Academic 2016 | en |
dc.subject | Secure Shell Protocol | en |
dc.subject | SSH | en |
dc.subject | Honeynet | en |
dc.subject | Intrusion Detection | en |
dc.subject | Classifier | en |
dc.subject | Ensemble | en |
dc.subject | Cross-Validation | en |
dc.title | Different approaches for the detection of SSH anomalous connections | en |
dcterms.accessRights | http://purl.org/coar/access_right/c_abf2 | en |
dcterms.source | Logic Journal of the IGPL | en |
local.contributor.group | Análisis de datos y ciberseguridad | es |
local.description.peerreviewed | true | en |
local.description.publicationfirstpage | 104 | en |
local.description.publicationlastpage | 114 | en |
local.identifier.doi | https://doi.org/10.1093/jigpal/jzv047 | en |
local.contributor.otherinstitution | Instituto Tecnológico de Castilla y León | es |
local.contributor.otherinstitution | https://ror.org/049da5t36 | es |
local.contributor.otherinstitution | https://ror.org/02f40zc51 | es |
local.source.details | Vol. 24. Nº 1. Pp. 104–114. February, 2016 | en |
oaire.format.mimetype | application/pdf | |
oaire.file | $DSPACE\assetstore | |
oaire.resourceType | http://purl.org/coar/resource_type/c_6501 | en |
oaire.version | http://purl.org/coar/version/c_ab4af688f83e57aa | en |